# config user local2) Import the CA certificate that signed the certificate which will be used for the authentication:
edit "userA"
set type ldap <----- Any user type can be used (does not necessarily have to be LDAP user).
set two-factor fortitoken
set fortitoken "FTKMOBXXXXXXXX"
set email-to "aaa@lab.lab"
set ldap-server "LDAP_lab"
end
# config user peerNOTE.
edit "test"
set ca "CA_Cert_1" <----- It is possible to set up additional certificate matching criteria.
end
# config vpn ssl settings5) The firewall policy is set only with the user defined in step 1).
# config authentication-rule
edit 1
set users "userA"
set portal "full-access"
set client-cert enable
set user-peer "test"
end
end
# config firewall policy
edit 1
set srcintf "ssl.root"
set dstintf "port1"
set srcaddr "SSLVPN_pool"
set dstaddr "example.com"
set action accept
set schedule "always"
set service "ALL"
set logtraffic all
set users "userA"
set nat enable
next
end
Related Articles
Technical Note: FortiClient with user certificate stored in local machine certification store
Technical Tip: RADIUS authentication and client certificates in SSL VPN
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.